Search by Keyword

Search returned 26 items for : F

KeywordYear PubArticleTitleAuthors
Facebook2018ViewFacebook Fanatics: A Linguistic and Sentiment Analysis of the Most “Fanned” Facebook Pages Peslak
Facebook2012ViewSocial Networking Systems and Campus Life Sgambato, Petkov, Wolf
facilitation2021ViewInterpreting Organizational Security Governance Objectives for Strategic Security Planning Mishra
factor analysis2012ViewAn Empirical Study of Social Networking Behavior Using Theory of Reasoned Action Peslak, Ceccucci, Sendall
factor analysis2010ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
failed projects2014ViewThe De-Escalation of the DHS HSIN Next Gen Project Rosenhauer, Korzaan
Features2019ViewAdversarial Machine Learning for Cyber Security De Lucia, Cotton
Federal Government2021ViewEnterprise Architecture Transformation Process from a Federal Government Perspective Canada, Halawi
financial decision support systems2015ViewBuilding a Better Stockbroker: Managing Big (Financial) Data by Constructing an Ontology-Based Framework Westrick, Du, Wolffe
financial industry2015ViewA Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry Lawler, Howell-Barber, Joseph
financial industry2014ViewA Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms Lawler, Howell-Barber, Joseph, Narula
firm-level capabilities2013ViewA Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms Lawler, Howell-Barber, Desai, Joseph
firm-level capabilities2009ViewThe Impact of Technology Diffusion on Employment, Compensation, and Productivity: Evidence from the Telecommunications Sector Clark, Moussawi
fit2011ViewPassword Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications Gebauer, Kline, He
fitness trackers2021ViewPrivacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers Pinchot, Cellante
Flow2009ViewCross-Cultural View of Handheld Wireless Media Usage Lind, Anyansi-Archibong, Anyansi
Flow Theory2019ViewAligning the Factors of Skill, Technology and Task to Influence the Continued Use of Mobile Payment Users in China Chen, Choi, Xiong, Tang
forensics2012ViewThe New Tech Effect: Analyzing Juror Credibility Davis, Paullet, Kraeer, Grant
Framework2021ViewTowards a Leader-Driven Supply Chain Cybersecurity Framework Vanajakumari, Mittal, Stoker, Clark, Miller
Framework2011ViewCreating a Framework for Research on Virtual Organizations Reinicke
frameworks2019ViewWhere We are with Enterprise Architecture Halawi, McCarthy, farah
fraud2022ViewCombating Private Blockchain Fraud: A Virtual Reality & Artificial Intelligence Model Aimiuwu
fraud2012ViewApplying Business Intelligence Concepts to Medicaid Claim Fraud Detection Copeland, Edberg, Wendel
frontier analysis2020ViewUnderstanding Campus Crime with a Multi-University Analytics System Iheadindu, Kline, Vetter, Clark
fun2009ViewCross-Cultural View of Handheld Wireless Media Usage Lind, Anyansi-Archibong, Anyansi
Function point2013ViewEarly Stage Probabilistic Software Project Schedule Estimation Kwon, Hammell II